Bug 1061509 (CVE-2013-7315) - CVE-2013-7315 Spring Framework: XML External Entity (XXE) injection flaw
Summary: CVE-2013-7315 Spring Framework: XML External Entity (XXE) injection flaw
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2013-7315
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-02-05 01:49 UTC by David Jorm
Modified: 2021-02-17 06:54 UTC (History)
3 users (show)

Fixed In Version: Spring Framework 3.2.4
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-02-05 02:01:44 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 1000186 0 medium CLOSED CVE-2013-4152 Spring Framework: XML External Entity (XXE) injection flaw 2021-02-22 00:41:40 UTC

Internal Links: 1000186

Description David Jorm 2014-02-05 01:49:03 UTC
It was found that Spring MVC processed user-provided XML with JAXB, in combination with a StAX XMLInputFactory, without disabling external entity resolution. A remote attacker could use this flaw to conduct XML External Entity (XXE) attacks on web sites, and read files in the context of the user running the application server. This flaw affects Spring Framework 3.2.x before 3.2.4 and 4.0.0.M1 through 4.0.0.M2.

Comment 1 David Jorm 2014-02-05 02:01:44 UTC
Upstream Patch:

https://jira.springsource.org/secure/attachment/21319/Jaxb2CollectionHttpMessageConverter.patch

Statement:

Not affected. Spring MVC as shipped in various Red Hat products does not include the vulnerable org.springframework.http.converter.xml.Jaxb2CollectionHttpMessageConverter class.


Note You need to log in before you can comment on or make changes to this bug.